Search results for: state security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9651

Search results for: state security

8241 Arabic Text Representation and Classification Methods: Current State of the Art

Authors: Rami Ayadi, Mohsen Maraoui, Mounir Zrigui

Abstract:

In this paper, we have presented a brief current state of the art for Arabic text representation and classification methods. We decomposed Arabic Task Classification into four categories. First we describe some algorithms applied to classification on Arabic text. Secondly, we cite all major works when comparing classification algorithms applied on Arabic text, after this, we mention some authors who proposing new classification methods and finally we investigate the impact of preprocessing on Arabic TC.

Keywords: text classification, Arabic, impact of preprocessing, classification algorithms

Procedia PDF Downloads 461
8240 Indoor and Outdoor Forest Farming for Year-Round Food and Medicine Production, Carbon Sequestration, Soil-Building, and Climate Change Mitigation

Authors: Jerome Osentowski

Abstract:

The objective at Central Rocky Mountain Permaculture Institute has been to put in practice a sustainable way of life while growing food, medicine, and providing education. This has been done by applying methods of farming such as agroforestry, forest farming, and perennial polycultures. These methods have been found to be regenerative to the environment through carbon sequestration, soil-building, climate change mitigation, and the provision of food security. After 30 years of implementing carbon farming methods, the results are agro-diversity, self-sustaining systems, and a consistent provision of food and medicine. These results are exhibited through polyculture plantings in an outdoor forest garden spanning roughly an acre containing about 200 varieties of fruits, nuts, nitrogen-fixing trees, and medicinal herbs, and two indoor forest garden greenhouses (one Mediterranean and one Tropical) containing about 50 varieties of tropical fruits, beans, herbaceous plants and more. While the climate zone outside the greenhouse is 6, the tropical forest garden greenhouse retains an indoor climate zone of 11 with near-net-zero energy consumption through the use of a climate battery, allowing the greenhouse to serve as a year-round food producer. The effort to source food from the forest gardens is minimal compared to annual crop production. The findings at Central Rocky Mountain Permaculture Institute conclude that agroecological methods are not only beneficial but necessary in order to revive and regenerate the environment and food security.

Keywords: agroecology, agroforestry, carbon farming, carbon sequestration, climate battery, food security, forest farming, forest garden, greenhouse, near-net-zero, perennial polycultures

Procedia PDF Downloads 438
8239 Piaui Solar: State Development Impulsed by Solar Photovoltaic Energy

Authors: Amanda Maria Rodrigues Barroso, Ary Paixao Borges Santana Junior, Caio Araujo Damasceno

Abstract:

In Piauí, the Brazilian state, solar energy has become one of the renewable sources targeted by internal and external investments, with the intention of leveraging the development of society. However, for a residential or business consumer to be able to deploy this source, there is usually a need for a high initial investment due to its high cost. The countless high taxes on equipment and services are one of the factors that contribute to this cost and ultimately fall on the consumer. Through analysis, a way of reducing taxes is sought in order to encourage consumer adhesion to the use of photovoltaic solar energy. Thus, the objective is to implement the Piauí Solar Program in the state of Piauí in order to stimulate the deployment of photovoltaic solar energy, through benefits granted to users, providing state development by boosting the diversification of the state's energy matrix. The research method adopted was based on the analysis of data provided by the Teresina City Hall, by the Brazilian Institute of Geography and Statistics and by a private company in the capital of Piauí. The account was taken of the total amount paid in Property and Urban Territorial Property Tax (IPTU), in electricity and in the service of installing photovoltaic panels in a residence with 6 people. Through Piauí Solar, a discount of 80% would be applied to the taxes present in the budgets regarding the implementation of these photovoltaic plates in homes and businesses, as well as in the IPTU. In addition, another factor also taken into account is the energy savings generated after the implementation of these boards. In the studied residence, the annual payment of IPTU went from R $ 99.83 reais to R $ 19.96, the reduction of taxes present in the budget for the implantation of solar panels, caused the value to increase from R $ 42,744.22 to R $ 37,241.98. The annual savings in electricity bills were estimated at around R $ 6,000. Therefore, there is a reduction of approximately 24% in the total invested. The trend of the Piauí Solar program, then, is to bring benefits to the state, providing an improvement in the living conditions of the population, through the savings generated by this program. In addition, an increase in the diversification of the Piauí energy matrix can be seen with the advancement of the use of this renewable energy.

Keywords: development, economy, energy, taxes

Procedia PDF Downloads 133
8238 Efficient Variable Modulation Scheme Based on Codebook in the MIMO-OFDM System

Authors: Yong-Jun Kim, Jae-Hyun Ro, Chang-Bin Ha, Hyoung-Kyu Song

Abstract:

Because current wireless communication requires high reliability in a limited bandwidth environment, this paper proposes the variable modulation scheme based on the codebook. The variable modulation scheme adjusts transmission power using the codebook in accordance with hannel state. Also, if the codebook is composed of many bits, the reliability is more improved by the proposed scheme. The simulation results show that the performance of proposed scheme has better reliability than the the performance of conventional scheme.

Keywords: MIMO-OFDM, variable modulation, codebook, channel state

Procedia PDF Downloads 583
8237 Time-Series Analysis of Port State Control Inspections for Tankers

Authors: Chien-Chung Yuan, Cunqiang Cai, Wu-Hsun Chung, Shu-Te Sung

Abstract:

A tanker is a critical vessel used to transport or store liquids or gases in bulk in maritime shipping. However, it is more dangerous than other types of vessels. Port State Control (PSC) inspection is an important measure to ensure maritime safety when such vessels traveling between ports. However, the current inspection system lacks a useful tool to observe the inspections for tankers and to identify non-random instances in PSC inspections. This study collects the inspection records in Taiwan’s ports from 2015 to 2018 and utilizes run charts to map the PSC inspections for tankers in terms of deficiencies. Based on these time-series charts, several patterns of deficiencies are identified. The results demonstrate that run charts are a useful tool to observe how the PSC inspections for tankers are performed. Also, the charts can help port administrations to identify abnormal phenomena for further investigation. Furthermore, with valuable information from the analysis, port administrations can take proactive improvement measures to ensure the safety of tanker shipping.

Keywords: port state control, tanker, run chart, deficiency

Procedia PDF Downloads 154
8236 Banking and Accounting Analysis Researches Effect on Environment

Authors: Marina Magdy Naguib Karas

Abstract:

New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time-consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.

Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development

Procedia PDF Downloads 46
8235 Expert System: Debugging Using MD5 Process Firewall

Authors: C. U. Om Kumar, S. Kishore, A. Geetha

Abstract:

An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.

Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization

Procedia PDF Downloads 426
8234 Information Communication Technology in Early Childhood Education: An Assessment of the Quality of ICT in the New Mega Primary Schools in Ondo State, Southwestern Nigeria

Authors: Oluyemi Christianah Ojo

Abstract:

This study seeks to investigate the quality of ICT provided in the new Caring Heart schools in Ondo State, Nigeria. The population for the study was all caring Heart Mega Schools in Ondo State, Nigeria. Research questions were generated; two instruments CCCMS and TQCUC were used to elicit information from the schools and the teachers. The study adopts descriptive survey approach. The studies revealed and concluded that ICT components were available and adequate in these schools, Charts showing ICT components and other forms of computer devices used as instructional materials were available but were not adequate; teachers teaching computer studies are competent in the delivery of instructions and in handling computer gadgets in the laboratory. The study recommended the provision of steady electricity, uninterrupted internet facilities and provision of adequate ICT components and charts for effective teaching delivery and learning.

Keywords: facilities, information communication technology, mega primary school, primary education

Procedia PDF Downloads 292
8233 Steady State Analysis of Distribution System with Wind Generation Uncertainity

Authors: Zakir Husain, Neem Sagar, Neeraj Gupta

Abstract:

Due to the increased penetration of renewable energy resources in the distribution system, the system is no longer passive in nature. In this paper, a steady state analysis of the distribution system has been done with the inclusion of wind generation. The modeling of wind turbine generator system and wind generator has been made to obtain the average active and the reactive power injection into the system. The study has been conducted on a IEEE-33 bus system with two wind generators. The present research work is useful not only to utilities but also to customers.

Keywords: distributed generation, distribution network, radial network, wind turbine generating system

Procedia PDF Downloads 401
8232 Enhancing Strategic Counter-Terrorism: Understanding How Familial Leadership Influences the Resilience of Terrorist and Insurgent Organizations in Asia

Authors: Andrew D. Henshaw

Abstract:

The research examines the influence of familial and kinship based leadership on the resilience of politically violent organizations. Organizations of this type frequently fight in the same conflicts though are called 'terrorist' or 'insurgent' depending on political foci of the time, and thus different approaches are used to combat them. The research considers them correlated phenomena with significant overlap and identifies strengths and vulnerabilities in resilience processes. The research employs paired case studies to examine resilience in organizations under significant external pressure, and achieves this by measuring three variables. 1: Organizational robustness in terms of leadership and governance. 2. Bounce-back response efficiency to external pressures and adaptation to endogenous and exogenous shock. 3. Perpetuity of operational and attack capability, and political legitimacy. The research makes three hypotheses. First, familial/kinship leadership groups have a significant effect on organizational resilience in terms of informal operations. Second, non-familial/kinship organizations suffer in terms of heightened security transaction costs and social economics surrounding recruitment, retention, and replacement. Third, resilience in non-familial organizations likely stems from critical external supports like state sponsorship or powerful patrons, rather than organic resilience dynamics. The case studies pair familial organizations with non-familial organizations. Set 1: The Haqqani Network (HQN) - Pair: Lashkar-e-Toiba (LeT). Set 2: Jemaah Islamiyah (JI) - Pair: The Abu Sayyaf Group (ASG). Case studies were selected based on three requirements, being: contrasting governance types, exposure to significant external pressures and, geographical similarity. The case study sets were examined over 24 months following periods of significantly heightened operational activities. This enabled empirical measurement of the variables as substantial external pressures came into force. The rationale for the research is obvious. Nearly all organizations have some nexus of familial interconnectedness. Examining familial leadership networks does not provide further understanding of how terrorism and insurgency originate, however, the central focus of the research does address how they persist. The sparse attention to this in existing literature presents an unexplored yet important area of security studies. Furthermore, social capital in familial systems is largely automatic and organic, given at birth or through kinship. It reduces security vetting cost for recruits, fighters and supporters which lowers liabilities and entry costs, while raising organizational efficiency and exit costs. Better understanding of these process is needed to exploit strengths into weaknesses. Outcomes and implications of the research have critical relevance to future operational policy development. Increased clarity of internal trust dynamics, social capital and power flows are essential to fracturing and manipulating kinship nexus. This is highly valuable to external pressure mechanisms such as counter-terrorism, counterinsurgency, and strategic intelligence methods to penetrate, manipulate, degrade or destroy the resilience of politically violent organizations.

Keywords: Counterinsurgency (COIN), counter-terrorism, familial influence, insurgency, intelligence, kinship, resilience, terrorism

Procedia PDF Downloads 307
8231 Financial Administration of Urban Local Governance: A Comparative Study of Ahmedabad Municipal Corporation (AMC) and Bhavnagar Municipal Corporation(BMC)

Authors: Aneri Mehta, Krunal Mehta

Abstract:

Financial administration is part of government which deals with collection, preservation and distribution of public funds, with the coordination of public revenue and expenditure, with the management of credit operation on behalf of the state and with the general control of the financial affairs of public households. The researcher has taken the prime body of the local self government viz. Municipal Corporation. However, the number of municipal corporations in India has rapidly increased in recent years. Countries 27% of the total population are living in urban area & in recent it increasing very fast. People are moving very fast from rural area to urban area. Their demand, awareness is increasing day by day. The Municipal Corporations render many services for the development of the urban area. Thus, researcher has taken a step to know the accounting practices of the municipal corporations of Gujarat state (AMC & BMC ). The research will try to show you the status of finance of municipal corporations. Article 243(w) of the constitution of India envisaged that the state government maybe, by law , endow the municipalities with such powers and authorities as may be necessary to enable them to function as institution of self government and such law may contain provision for devolution of powers and responsibilities upon municipalities subjects to such condition as may be specified there in with respect to (i) the peroration of plans for economic development and social justice and (ii) the performance of the function and the implementation of schemes as may be entrusted to them including those in relation to the matters listed in the twelfth schedule. The three tier structure of the Indian Government i.e. Union, State & Local Self Government is the scenario of the Indian constitution. Local Self Government performs or renders many services under the direct control of state government. They (local bodies) possess autonomy within its limited sphere, raise revenue through local taxation and spend its income on local services.

Keywords: financial administration, urban local bodies, local self government, constitution

Procedia PDF Downloads 462
8230 The Chromatic Identity of the Ancestral Architecture of the Ksour of Bechar, Algeria

Authors: Racha Ghariri, Khaldia Belkheir, Assil Ghariri

Abstract:

In this paper, the researchers present a part of their research on the colors of the city of Bechar (Algeria). It is about a chromatic study of the ancient architecture of the Ksour. Being a subject of intervention, regarding their degradable state, the Ksour are the case of their study, especially that the subject of color does not occupy, virtually, the involved on these heritage sites. This research aims to put the basics for methods which allow to know what to preserve as a color and how to do so, especially during a restoration, and to understand the evolution of the chromatic state of the city.

Keywords: architecture/colours, chromatic identity, geography of colour, regional palette, chromatic architectural analysis

Procedia PDF Downloads 303
8229 The Impact of Technological Advancement on Academic Performance of Mathematics Students in Tertiary Institutions in Ekiti State, Nigeria

Authors: Odunayo E. Popoola, Charles A. Aladesaye, Sunday O. Gbenro

Abstract:

The study investigated the impact of technological advancement on the academic performance of Mathematics students in tertiary institutions in Ekiti State, Nigeria. The quasi-experimental research design was adopted for the study. The population for the study consisted of all the 100 level undergraduates and all Mathematics lecturers in the Department of Mathematics in all the five tertiary institutions in the State. The sample of this study was made of one hundred (100) students and fifty (50) lecturers randomly selected using stratified sampling technique. Hypotheses were postulated to find out whether (i) advancement in technology influences the academic performance of students in Mathematics (ii) teaching method and gender disparity influences the academic performance of students in Mathematics. The study revealed that teaching method, gender, and technology influence academic performance of students in Mathematics. Based on the findings, it is recommended that curriculum and assessment in school Mathematics should explicitly require that all undergraduate become proficient in using digital technologies for mathematical purposes so as to enhance the better performance of students in Mathematics.

Keywords: mathematics, performance, tertiary institutions, technology

Procedia PDF Downloads 176
8228 Ideal Posture in Regulating Legal Regulations in Indonesia

Authors: M Jeffri Arlinandes Chandra, Puwaningdyah Murti Wahyuni, Dewi Mutiara M Jeffri Arlinandes Chandra, Puwaningdyah Murti Wahyuni, Dewi Mutiara

Abstract:

Indonesia is a state of the law in accordance with article 1 paragraph 3 of the Constitution of the Republic of Indonesia (1945 Constitution), namely, 'the State of Indonesia is a state of law'. The consequences of the rule of law are making the law as the main commanding officer or making the law as a basis for carrying out an action taken by the state. The types of regulations and procedures for the formation of legislation in Indonesia are contained in Law Number 12 of 2011 concerning the Formation of Legislation. Various attempts were made to make quality regulations both in the formal hierarchy and material hierarchy such as synchronization and harmonization in the formation of laws and regulations so that there is no conflict between equal and hierarchical laws, but the fact is that there are still many conflicting regulations found between one another. This can be seen clearly in the many laws and regulations that were sued to judicial institutions such as the Constitutional Court (MK) and the Supreme Court (MA). Therefore, it is necessary to have a formulation regarding the governance of the formation of laws and regulations so as to minimize the occurrence of lawsuits to the court so that positive law can be realized which can be used today and for the future (ius constituendum). The research method that will be used in this research is a combination of normative research (library research) supported by empirical data from field research so that it can formulate concepts and answer the challenges being faced. First, the structuring of laws and regulations in Indonesia must start from the inventory of laws and regulations, whether they can be classified based on the type of legislation, what are they set about, the year of manufacture, etc. so that they can be clearly traced to the regulations relating to the formation of laws and regulations. Second, the search and revocation/revocation of laws and regulations that do not exist in the state registration system. Third, the periodic evaluation system is carried out at every level of the hierarchy of laws and regulations. These steps will form an ideal model of laws and regulations in Indonesia both in terms of content and material so that the instructions can be codified and clearly inventoried so that they can be accessed by the wider community as a concrete manifestation of the principle that all people know the law (presumptio iures de iure).

Keywords: legislation, review, evaluation, reconstruction

Procedia PDF Downloads 145
8227 Online Monitoring Rheological Property of Polymer Melt during Injection Molding

Authors: Chung-Chih Lin, Chien-Liang Wu

Abstract:

The detection of the polymer melt state during manufacture process is regarded as an efficient way to control the molded part quality in advance. Online monitoring rheological property of polymer melt during processing procedure provides an approach to understand the melt state immediately. Rheological property reflects the polymer melt state at different processing parameters and is very important in injection molding process especially. An approach that demonstrates how to calculate rheological property of polymer melt through in-process measurement, using injection molding as an example, is proposed in this study. The system consists of two sensors and a data acquisition module can process the measured data, which are used for the calculation of rheological properties of polymer melt. The rheological properties of polymer melt discussed in this study include shear rate and viscosity which are investigated with respect to injection speed and melt temperature. The results show that the effect of injection speed on the rheological properties is apparent, especially for high melt temperature and should be considered for precision molding process.

Keywords: injection molding, melt viscosity, shear rate, monitoring

Procedia PDF Downloads 377
8226 Comparative Analysis of Teachers’ Performance in Private and Public Primary Schools in Oyo State, Nigeria

Authors: Oyetunji John Adenuga

Abstract:

This study on the comparative analysis of the performance of teachers in private and public schools was carried out in Ibadan North West Local Government Area of Oyo State. This study examined the justification for the claim that there is difference in the performance of teachers in private and public primary schools and at the same time identified factors responsible for the difference in the performance of these teachers. A descriptive survey research design was used for the study. Data generated were analysed using t-test and regression analysis. The findings of the study revealed that there is significant difference in the performance of teachers in private and private primary schools in Ibadan North West Local Government Area of Oyo State (t=64.09; df=459; p,.05). The findings also revealed that the method of teaching in private primary schools is significantly different from the method of teaching in public primary schools in Ibadan North West Local Government Area of Oyo State (t=73.08; df=459; p,.05). Findings revealed that school leadership and management have significant contribution on the performance of private and public primary school teachers in Ibadan North West Local Area of Oyo State. Based on the finding, the following recommendations were made: Primary school teachers need to be motivated and rewarded for excellent performance. Primary schools should be properly equipped with teaching-aid facilities, laboratories and libraries. Government should use the findings of this study to improve on teaching materials provided to the primary school teachers in Nigeria. Public primary schools should be designed by education planners, administrators and government. Headmasters, proprietors and teachers of primary schools should look inward and give a performance appraisal and evaluation of themselves form time to time based on subject they taught. Finally, school administrators should be conscious of the way they manage the teachers in schools not only in informal situations but also in formal settings.

Keywords: private education, public education, school leadership, school management, teachers performance

Procedia PDF Downloads 339
8225 Descriptive Analysis of the Relationship between State and Civil Society in Hegel's Political Thought

Authors: Garineh Keshishyan Siraki

Abstract:

Civil society is one of the most important concepts of the twentieth century and even so far. Modern and postmodern thinkers have provided different definitions of civil society. Of course, the concept of civil society has undergone many changes over time. The relationship between government and civil society is one of the relationships that attracted the attention of many contemporary thinkers. Hegel, the thinker we discussed in this article also explores the relationship between these concepts and emphasizing the dialectical method, he has drawn three lines between family, state, and civil society. In Hegel's view, the creation of civil society will lead to a reduction of social conflict and increased social cohesion. The importance of the issue is due to the study of social cohesion and the ways to increase it. The importance of the issue is due to the study of social cohesion and the ways to increase it. This paper, which uses a descriptive-analytic method to examine Hegel's dialectical theory of civil society, after examining the relationship between the family and the state and finding the concept of civil society as the interface and the interconnected circle of these two, investigates tripartite economic, legal, and pluralistic systems. In this article, after examining the concepts of the market, the right and duty, the individual interests and the development of the exchange economy, Hegel's view is to examine the concept of freedom and its relation with civil society. The results of this survey show that, in Hegel's thought, the separation between the political system and the social system is a natural and necessary thing. In Hegel's view, because of those who are in society, they have selfish features; the community is in tension and contradiction. Therefore, the social realms within which conflicts emerge must be identified and controlled by specific mechanisms. It can also be concluded that the government can act to reduce social conflicts by legislating, using force or forming trade unions. The bottom line is that Hegel wants to reconcile between the individual, the state and civil society and it is not possible to rely on ethics.

Keywords: civil society, cohesion system, economic system, family, the legal system, state

Procedia PDF Downloads 189
8224 The Politics of Health Education: A Cultural Analysis of Tobacco Control Communication in India

Authors: Ajay Ivan

Abstract:

This paper focuses on the cultural politics of health-promotional and disease-preventive pedagogic practices in the context of the national tobacco control programme in India. Tobacco consumption is typically problematised as a paradox: tobacco poses objective health risks such as cancer and heart disease, but its production, sale and export contribute significantly to state revenue. A blanket ban on tobacco products, therefore, is infeasible though desirable. Instead, initiatives against tobacco use have prioritised awareness creation and behaviour change to reduce its demand. This paper argues that public health communication is not, as commonly assumed, an apolitical and neutral transmission of disease-preventive information. Drawing on Michel Foucault’s concept of governmentality, it examines such campaigns as techniques of disciplining people rather than coercing them to give up tobacco use, which would be both impractical and counter-productive. At the level of the population, these programmes constitute a security mechanism that reduces risks without eliminating them, so as to ensure an optimal level of public health without hampering the economy. Anti-tobacco pedagogy thus aligns with a contemporary paradigm of health that emphasises risk-assessment and lifestyle management as tools of governance, using pedagogic techniques to teach people how to be healthy. The paper analyses the pictorial health warnings on tobacco packets and anti-tobacco advertisements in movie theatres mandated by the state, along with awareness-creation messages circulated by anti-tobacco advocacy groups in India, to show how they discursively construct tobacco and its consumption as a health risk. Smoking is resignified from a pleasurable and sociable practice to a deadly addiction that jeopardises the health of those who smoke and those who passively inhale the smoke. While disseminating information about the health risks of tobacco, these initiatives employ emotional and affective techniques of persuasion to discipline tobacco users. They incite fear of death and of social ostracism to motivate behaviour change, complementing their appeals to reason. Tobacco is portrayed as a grave moral danger to the family and a detriment to the vitality of the nation, such that using it contradicts one’s duties as a parent or citizen. Awareness programmes reproduce prevailing societal assumptions about health and disease, normalcy and deviance, and proper and improper conduct. Pedagogy thus functions as an apparatus of public health governance, recruiting subjects as volunteers in their own regulation and aligning their personal goals and aspirations to the objectives of tobacco control. The paper links this calculated management of subjectivity and the self-responsibilisation of the pedagogic subject to a distinct mode of neoliberal civic governance in contemporary India. Health features prominently in this mode of governance that serves the biopolitical obligation of the state as laid down in Article 39 of the Constitution, which includes a duty to ensure the health of its citizens. Insofar as the health of individuals is concerned, the problem is how to balance this duty of the state with the fundamental right of the citizen to choose how to live. Public health pedagogy, by directing the citizen’s ‘free’ choice without unduly infringing upon it, offers a tactical solution.

Keywords: public health communication, pedagogic power, tobacco control, neoliberal governance

Procedia PDF Downloads 77
8223 Search for Alternative Strategy to Enhancing Food Security at Household Level: Hybrid Urban Agriculture as a Strategy

Authors: Nyumbaiza Tambwe

Abstract:

The purpose of this paper is to demonstrate that hybrid urban agriculture as the most practiced type of urban agriculture in the majority of cities in sub-Saharan Africa can be taken as an alternative strategy in fighting food insecurity. The practice not only provides food, generates income and fights against unemployment; it constitutes a true back-up for households during crisis linked to the nature of capitalism system. African cities are mostly characterized by rapid population growth, rampant poverty, and high level of unemployment and food insecurity. Those factors and many others are at the origin of the emergence of urban agriculture in many African cities. Based particularly on results of research undertaken in the Democratic Republic of Congo (DRC), but also in comparison with those realized in other parts of the African continent, the paper is a case study. Therefore, the paper firstly describes the situation of food in Africa, secondly, presents hybrid urban agriculture as a household strategy in fighting food insecurity and finally shows possibilities and limits of this practice.

Keywords: alternative strategy, food security, household strategy, hybrid urban agriculture

Procedia PDF Downloads 322
8222 Solar Photovoltaic System (PV) Usages on Residential Houses in the Absheron Peninsula Region of the Republic of Azerbaijan: Obstacles and Opportunities

Authors: Elnur Abbasov

Abstract:

Energy security and climate change comprise some of the most important concerns facing humankind today and probably in the future if they are not addressed appropriately. In order to stabilize the global climate, there is the need for the world to lessen its use of fossil energy, which requires enhancement of current energy efficiency as well as the development of novel energy sources, such as energy obtained from renewable sources. There is no doubt that the steady transition towards a solar-based economy is likely to result in the development of completely new sectors, behaviours, and jobs that are pro-environmental. Azerbaijan Republic as the largest nation state in the South Caucasus Region has the potential for using and developing the renewable sources of energy in order to support the environmental challenge resolution associated with the climate change, improving the environmental situation in the country. Solar PV comprises one of the direct usages of solar energy. In this paper, sustainable PV usage scenario in residential houses was introduced to reduce negative environmental effects of land use, water consumption, air pollution etc. It was recommended by an author that, PV systems can be part of function and design of residential building components: such as roofs, walls, windows.

Keywords: energy efficiency, environmentally friendly, photovoltaic engineering, sustainable energy usage scenario

Procedia PDF Downloads 240
8221 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 391
8220 Problems concerning Formation of Institutional Framework for Electronic Democracy in Georgia

Authors: Giorgi Katamadze

Abstract:

Open public service and accountability towards citizens is an important feature of democratic state based on rule of law. Effective use of electronic resources simplifies bureaucratic procedures, makes direct communications, helps exchange information, ensures government’s openness and in general helps develop electronic/digital democracy. Development of electronic democracy should be a strategic dimension of Georgian governance. Formation of electronic democracy, its functional improvement should become an important dimension of the state’s information policy. Electronic democracy is based on electronic governance and implies modern information and communication systems, their adaptation to universal standards. E-democracy needs involvement of governments, voters, political parties and social groups in an electronic form. In the last years the process of interaction between the citizen and the state becomes simpler. This process is achieved by the use of modern technological systems which gives to a citizen a possibility to use different public services online. For example, the website my.gov.ge makes interaction between the citizen, business and the state more simple, comfortable and secure. A higher standard of accountability and interaction is being established. Electronic democracy brings new forms of interactions between the state and the citizen: e-engagement – participation of society in state politics via electronic systems; e-consultation – electronic interaction among public officials, citizens and interested groups; e-controllership – electronic rule and control of public expenses and service. Public transparency is one of the milestones of electronic democracy as well as representative democracy as only on mutual trust and accountability can democracy be established. In Georgia, institutional changes concerning establishment and development of electronic democracy are not enough. Effective planning and implementation of a comprehensive and multi component e-democracy program (central, regional, local levels) requires telecommunication systems, institutional (public service, competencies, logical system) and informational (relevant conditions for public involvement) support. Therefore, a systematic project of formation of electronic governance should be developed which will include central, regional, municipal levels and certain aspects of development of instrumental basis for electronic governance.

Keywords: e-democracy, e-governance, e-services, information technology, public administration

Procedia PDF Downloads 333
8219 Characterization, Classification and Fertility Capability Classification of Three Rice Zones of Ebonyi State, Southeastern Nigeria

Authors: Sunday Nathaniel Obasi, Chiamak Chinasa Obasi

Abstract:

Soil characterization and classification provide the basic information necessary to create a functional evaluation and soil classification schemes. Fertility capability classification (FCC) on the other hand is a technical system that groups the soils according to kinds of problems they present for management of soil physical and chemical properties. This research was carried out in Ebonyi state, southeastern Nigeria, which is an agrarian state and a leading rice producing part of southeastern Nigeria. In order to maximize the soil and enhance the productivity of rice in Ebonyi soils, soil classification, and fertility classification information need to be supplied. The state was grouped into three locations according to their agricultural zones namely; Ebonyi north, Ebonyi central and Ebonyi south representing Abakaliki, Ikwo and Ivo locations respectively. Major rice growing areas of the soils were located and two profile pits were sunk in each of the studied zones from which soils were characterized, classified and fertility capability classification (FCC) developed. Soil classification was done using United State Department of Agriculture (USDA) Soil Taxonomy and correlated with World Reference Base for soil resources. Results obtained classified Abakaliki 1 and Abakaliki 2 as Typic Fluvaquents (Ochric Fluvisols). Ikwo 1 was classified as Vertic Eutrudepts (Eutric Vertisols) while Ikwo 2 was classified as Typic Eutrudepts (Eutric Cambisols). Ivo 1 and Ivo 2 were both classified as Aquic Eutrudepts (Gleyic Leptosols). Fertility capability classification (FCC) revealed that all studied soils had mostly loamy topsoils and subsoils except Ikwo 1 with clayey topsoil. Limitations encountered in the studied soils include; dryness (d), low ECEC (e), low nutrient capital reserve (k) and water logging/ anaerobic condition (gley). Thus, FCC classifications were Ldek for Abakaliki 1 and 2, Ckv for Ikwo 1, LCk for Ikwo 2 while Ivo 1 and 2 were Legk and Lgk respectively.

Keywords: soil classification, soil fertility, limitations, modifiers, Southeastern Nigeria

Procedia PDF Downloads 128
8218 Toward a Characteristic Optimal Power Flow Model for Temporal Constraints

Authors: Zongjie Wang, Zhizhong Guo

Abstract:

While the regular optimal power flow model focuses on a single time scan, the optimization of power systems is typically intended for a time duration with respect to a desired objective function. In this paper, a temporal optimal power flow model for a time period is proposed. To reduce the computation burden needed for calculating temporal optimal power flow, a characteristic optimal power flow model is proposed, which employs different characteristic load patterns to represent the objective function and security constraints. A numerical method based on the interior point method is also proposed for solving the characteristic optimal power flow model. Both the temporal optimal power flow model and characteristic optimal power flow model can improve the systems’ desired objective function for the entire time period. Numerical studies are conducted on the IEEE 14 and 118-bus test systems to demonstrate the effectiveness of the proposed characteristic optimal power flow model.

Keywords: optimal power flow, time period, security, economy

Procedia PDF Downloads 446
8217 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 359
8216 Banking and Accounting Analysis Researches Effect on Environment and Income

Authors: Gerges Samaan Henin Abdalla

Abstract:

New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.

Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development

Procedia PDF Downloads 52
8215 BingleSeq: A User-Friendly R Package for Single-Cell RNA-Seq Data Analysis

Authors: Quan Gu, Daniel Dimitrov

Abstract:

BingleSeq was developed as a shiny-based, intuitive, and comprehensive application that enables the analysis of single-Cell RNA-Sequencing count data. This was achieved via incorporating three state-of-the-art software packages for each type of RNA sequencing analysis, alongside functional annotation analysis and a way to assess the overlap of differential expression method results. At its current state, the functionality implemented within BingleSeq is comparable to that of other applications, also developed with the purpose of lowering the entry requirements to RNA Sequencing analyses. BingleSeq is available on GitHub and will be submitted to R/Bioconductor.

Keywords: bioinformatics, functional annotation analysis, single-cell RNA-sequencing, transcriptomics

Procedia PDF Downloads 198
8214 Smart Demand Response: A South African Pragmatic, Non-Destructive and Alternative Advanced Metering Infrastructure-Based Maximum Demand Reduction Methodology

Authors: Christo Nicholls

Abstract:

The National Electricity Grid (NEG) in South Africa has been under strain for the last five years. This overburden of the NEG led Eskom (the State-Owned Entity responsible for the NEG) to implement a blunt methodology to assist them in reducing the maximum demand (MD) on the NEG, when required, called Loadshedding. The challenge of this methodology is that not only does it lead to immense technical issues with the distribution network equipment, e.g., transformers, due to the frequent abrupt off and on switching, it also has a broader negative fiscal impact on the distributors, as their key consumers (commercial & industrial) are now grid defecting due to the lack of Electricity Security Provision (ESP). This paper provides a pragmatic alternative methodology utilizing specific functionalities embedded within direct-connect single and three-phase Advanced Meter Infrastructure (AMI) Solutions deployed within the distribution network, in conjunction with a Multi-Agent Systems Based AI implementation focused on Automated Negotiation Peer-2-Peer trading. The results of this research clearly illustrate, not only does methodology provide a factual percentage contribution towards the NEG MD at the point of consideration, it also allows the distributor to leverage the real-time MD data from key consumers to activate complex, yet impact-measurable Demand Response (DR) programs.

Keywords: AI, AMI, demand response, multi-agent

Procedia PDF Downloads 108
8213 Democratising Rivers: Local River Conflicts in Rajasthan

Authors: Renu Sisodia

Abstract:

This paper attempted to explore and explain the local level river water conflicts in the larger context of state - society relations. This study also covered causes of local level river water conflicts in the catchment area of Bandi and Arvari river of Rajasthan. The focus of the study was on the emergence of community driven, decentralised management of river water bodies and strategies used by local communities to protect and manage river water conflicts. The research is conducted through the process of designing a framework based on essential theoretical and practical findings supported by primary and secondary data. Two in depth case study is conducted to understand the phenomenon in depth. The first field site is Bandi River of Pali district, which is about the struggle between textile industries, community and the State government in which water pollution is said to be one of the driving force of the conflict. Finding shows that the state is supporting textile industries in Pali district have not been adherent to the environmental ethics. Present legal infrastructure and local institutions fail to resolve the serious problem of water pollution in Bandi River and its adverse impact on the local community as a result local community resistance against the local administration and the state government. The second case illustrates the plight of Arvari River in Alwar district. Tussle for the ownership of fisheries between local community, the private fish contractor and State government has been the main bone of contestation. To resolve this conflict local community formed conflict management mechanism named as Arvari Parliament. Arvari Parliament has its own principle and rules to resolve water conflicts related to ownership of the river and use of the river water. The research findings also highlight the co-existence between conventional and modern practices in resolving conflicts.

Keywords: water, water pollution, water conflicts, water scarcity, conflict resolution, local community

Procedia PDF Downloads 481
8212 Prediction of Thermodynamic Properties of N-Heptane in the Critical Region

Authors: Sabrina Ladjama, Aicha Rizi, Azzedine Abbaci

Abstract:

In this work, we use the crossover model to formulate a comprehensive fundamental equation of state for the thermodynamic properties for several n-alkanes in the critical region that extends to the classical region. This equation of state is constructed on the basis of comparison of selected measurements of pressure-density-temperature data, isochoric and isobaric heat capacity. The model can be applied in a wide range of temperatures and densities around the critical point for n-heptane. It is found that the developed model represents most of the reliable experimental data accurately.

Keywords: crossover model, critical region, fundamental equation, n-heptane

Procedia PDF Downloads 473